Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 04:24
Static task
static1
Behavioral task
behavioral1
Sample
a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exe
Resource
win10v2004-20230220-en
General
-
Target
a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exe
-
Size
735KB
-
MD5
a51c02b762b1b9550a7347214c8ac876
-
SHA1
79c76af61c5f33e949f0a60be23441aaeb95f035
-
SHA256
a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425
-
SHA512
e78db4bbe2c4e8370a159df1c2050b63b2ff83aa1d7f88294f9289132ae4f78d8c1797dc102b9fbeaf11df0b33d8743c5a9179deb07d7f4feaa36c91cd91c08c
-
SSDEEP
12288:XMrjy90DXyur4aThTySrvZqBDDAS/KZXR2CRYiR55UuVTAHLk9cJv0g+8JEYRtS:cyALkWvZGnASoXR2CRY45UVHLmcJMCEx
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea7208848.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7208848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7208848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7208848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7208848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7208848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7208848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v9059753.exev4952144.exev2547904.exea7208848.exeb7800435.exec6802449.exepid process 2660 v9059753.exe 800 v4952144.exe 3224 v2547904.exe 1908 a7208848.exe 3668 b7800435.exe 1412 c6802449.exe -
Processes:
a7208848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7208848.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v9059753.exev4952144.exev2547904.exea51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9059753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9059753.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4952144.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4952144.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2547904.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2547904.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b7800435.exedescription pid process target process PID 3668 set thread context of 1352 3668 b7800435.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4608 3668 WerFault.exe b7800435.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a7208848.exeAppLaunch.exepid process 1908 a7208848.exe 1908 a7208848.exe 1352 AppLaunch.exe 1352 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a7208848.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 1908 a7208848.exe Token: SeDebugPrivilege 1352 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exev9059753.exev4952144.exev2547904.exeb7800435.exedescription pid process target process PID 5032 wrote to memory of 2660 5032 a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exe v9059753.exe PID 5032 wrote to memory of 2660 5032 a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exe v9059753.exe PID 5032 wrote to memory of 2660 5032 a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exe v9059753.exe PID 2660 wrote to memory of 800 2660 v9059753.exe v4952144.exe PID 2660 wrote to memory of 800 2660 v9059753.exe v4952144.exe PID 2660 wrote to memory of 800 2660 v9059753.exe v4952144.exe PID 800 wrote to memory of 3224 800 v4952144.exe v2547904.exe PID 800 wrote to memory of 3224 800 v4952144.exe v2547904.exe PID 800 wrote to memory of 3224 800 v4952144.exe v2547904.exe PID 3224 wrote to memory of 1908 3224 v2547904.exe a7208848.exe PID 3224 wrote to memory of 1908 3224 v2547904.exe a7208848.exe PID 3224 wrote to memory of 3668 3224 v2547904.exe b7800435.exe PID 3224 wrote to memory of 3668 3224 v2547904.exe b7800435.exe PID 3224 wrote to memory of 3668 3224 v2547904.exe b7800435.exe PID 3668 wrote to memory of 1352 3668 b7800435.exe AppLaunch.exe PID 3668 wrote to memory of 1352 3668 b7800435.exe AppLaunch.exe PID 3668 wrote to memory of 1352 3668 b7800435.exe AppLaunch.exe PID 3668 wrote to memory of 1352 3668 b7800435.exe AppLaunch.exe PID 3668 wrote to memory of 1352 3668 b7800435.exe AppLaunch.exe PID 800 wrote to memory of 1412 800 v4952144.exe c6802449.exe PID 800 wrote to memory of 1412 800 v4952144.exe c6802449.exe PID 800 wrote to memory of 1412 800 v4952144.exe c6802449.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exe"C:\Users\Admin\AppData\Local\Temp\a51724213693fe0e8a39b388b28211d4be2c7e6d794459e7a6f0b23b4907e425.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9059753.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9059753.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4952144.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4952144.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2547904.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2547904.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7208848.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7208848.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7800435.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7800435.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 1406⤵
- Program crash
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6802449.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6802449.exe4⤵
- Executes dropped EXE
PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3668 -ip 36681⤵PID:3796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9059753.exeFilesize
529KB
MD5a4209e9439096df979f452c5bcec5754
SHA1f93c0bcdf68f2000dd5061e57e24ee8cdf8d31ab
SHA256b45b28ce410ad5e46edfe5129dab7483add3f7ab710eb109cc57f03f625dcf6d
SHA512786c5cd91e7714d74cfb2af3bea5511f07148a7ec809eb5709ea71896f28ab34849d536b2972f45b6c2a6ac80b325d4522ef82da5a10f3a30aa554f0be41e17b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9059753.exeFilesize
529KB
MD5a4209e9439096df979f452c5bcec5754
SHA1f93c0bcdf68f2000dd5061e57e24ee8cdf8d31ab
SHA256b45b28ce410ad5e46edfe5129dab7483add3f7ab710eb109cc57f03f625dcf6d
SHA512786c5cd91e7714d74cfb2af3bea5511f07148a7ec809eb5709ea71896f28ab34849d536b2972f45b6c2a6ac80b325d4522ef82da5a10f3a30aa554f0be41e17b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4952144.exeFilesize
357KB
MD52b21d1907b711eee44a4651581a3db66
SHA1ab722af31c7c8bf8e42975f72774b02ee62d99ed
SHA2567348dfcb2a1c781fce2c225d4f37aff573b9700919c64ef13974f6c12c1d9fcb
SHA512f301f9bd480994ee5e2555e0bb7ee7a0a15c513b92250e25cf6ee140e1643ed6f84ecdf995e26e207d84ef99ee35c0362ccb4704bc4c84de54e41aa823c03b6a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4952144.exeFilesize
357KB
MD52b21d1907b711eee44a4651581a3db66
SHA1ab722af31c7c8bf8e42975f72774b02ee62d99ed
SHA2567348dfcb2a1c781fce2c225d4f37aff573b9700919c64ef13974f6c12c1d9fcb
SHA512f301f9bd480994ee5e2555e0bb7ee7a0a15c513b92250e25cf6ee140e1643ed6f84ecdf995e26e207d84ef99ee35c0362ccb4704bc4c84de54e41aa823c03b6a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6802449.exeFilesize
172KB
MD5d44c0e68ee38672de408ccae4d0f8b7f
SHA1f75d8047f74ba6e5248c5c642dbeb92560066aa5
SHA2569e5311b1372be42354e149f9872a31556f48794be4471c9bd096b30cd7803e7a
SHA51277b0bb23bbb29a477220c718062507a33d94dc5153612746b007cd6b86903eb10771756a90039cda1203ba92f34fc937ff1b40b513995e341e959d2727461207
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6802449.exeFilesize
172KB
MD5d44c0e68ee38672de408ccae4d0f8b7f
SHA1f75d8047f74ba6e5248c5c642dbeb92560066aa5
SHA2569e5311b1372be42354e149f9872a31556f48794be4471c9bd096b30cd7803e7a
SHA51277b0bb23bbb29a477220c718062507a33d94dc5153612746b007cd6b86903eb10771756a90039cda1203ba92f34fc937ff1b40b513995e341e959d2727461207
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2547904.exeFilesize
202KB
MD556d5c73885fc2c9a1635bdad5481b85f
SHA1e3a4c51d0a73ffb03d0c85edfde6b41e8f0b11c4
SHA256def2c61ef2e24e9aab2be07f799154bd135fdfdd2338bf875ea5e64ecb4178ca
SHA512dfbe89ba31c103b95ffc5f58ee5bb9b897cfc10319e85bb5831297b510379d60e01e1e8db6842bc394650578960d2c19fda9adb3e3f23e9e5e12c05d5b68d689
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2547904.exeFilesize
202KB
MD556d5c73885fc2c9a1635bdad5481b85f
SHA1e3a4c51d0a73ffb03d0c85edfde6b41e8f0b11c4
SHA256def2c61ef2e24e9aab2be07f799154bd135fdfdd2338bf875ea5e64ecb4178ca
SHA512dfbe89ba31c103b95ffc5f58ee5bb9b897cfc10319e85bb5831297b510379d60e01e1e8db6842bc394650578960d2c19fda9adb3e3f23e9e5e12c05d5b68d689
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7208848.exeFilesize
13KB
MD5c1510b25bc0838064e7a3f941aa8c056
SHA11b7e18e23a39b53d8d1e5c8601438696cdc50cb1
SHA256406e902a6e5af253a40d802f748928c9243ff90491ed3826646f1f3732b88790
SHA5128cfb75751800dc0396c03dc8d81fb005d595f62c9649559a8a00fabdb0fdf8d82e76d3deee0d9273f1c490b0dda85e2bda946aafff8f5001275c8fbc6c5c6165
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7208848.exeFilesize
13KB
MD5c1510b25bc0838064e7a3f941aa8c056
SHA11b7e18e23a39b53d8d1e5c8601438696cdc50cb1
SHA256406e902a6e5af253a40d802f748928c9243ff90491ed3826646f1f3732b88790
SHA5128cfb75751800dc0396c03dc8d81fb005d595f62c9649559a8a00fabdb0fdf8d82e76d3deee0d9273f1c490b0dda85e2bda946aafff8f5001275c8fbc6c5c6165
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7800435.exeFilesize
117KB
MD50190c7fac717448e1aa19d4013adb411
SHA17022e8d4f1450685cc30a2b125b92a7866386e2b
SHA25684d620318749e8e68d0ae64b2388605cb54081deeafd2c842327d4b8a128bf32
SHA512cdf2269d17351d94431503736393bce3ab9c80cc5c04a30a56d13a42db059851b41ef93f5c6a47c7d2b079d6631fd60af040c7c1ab6624a72f4810564e0d586b
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7800435.exeFilesize
117KB
MD50190c7fac717448e1aa19d4013adb411
SHA17022e8d4f1450685cc30a2b125b92a7866386e2b
SHA25684d620318749e8e68d0ae64b2388605cb54081deeafd2c842327d4b8a128bf32
SHA512cdf2269d17351d94431503736393bce3ab9c80cc5c04a30a56d13a42db059851b41ef93f5c6a47c7d2b079d6631fd60af040c7c1ab6624a72f4810564e0d586b
-
memory/1352-167-0x0000000000550000-0x000000000055A000-memory.dmpFilesize
40KB
-
memory/1412-175-0x0000000000030000-0x0000000000060000-memory.dmpFilesize
192KB
-
memory/1412-176-0x000000000A3F0000-0x000000000AA08000-memory.dmpFilesize
6.1MB
-
memory/1412-177-0x0000000009EE0000-0x0000000009FEA000-memory.dmpFilesize
1.0MB
-
memory/1412-178-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/1412-179-0x0000000009E10000-0x0000000009E4C000-memory.dmpFilesize
240KB
-
memory/1412-180-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/1412-182-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/1908-161-0x00000000001A0000-0x00000000001AA000-memory.dmpFilesize
40KB